hardware-and-architecture
We present LSH-Burn, a Rust-based implementation of the LSH-SFA (Spacetime Field Attention) architecture using the Burn deep learning framework. LSH-Burn provides 1+N pluggable backend support for CUDA, Vulkan, AMD ROCm, WGPU, and ndarray backends. Key components include WavePacketProjector for token-to-wave-packet conversion, FieldAttention with Gaussian similarity, ResonanceCoupling for frequen…
International audience
Developing high-security anticounterfeiting with reliable authentication remains a significant challenge in preventing information leakage and economic losses from counterfeiting. Here, we successfully reported physically uncopiable optical system based on piezochromic polymer hydrogels (PPH). Pressure treatment induces a clustering-triggered emission transition from red to blue, driven by suppre…
The development and manufacturing process for Integrated Circuits (ICs) has become complex and globally distributed. System integrators use a mix of custom made logic with third-party Intellectual Property (IP) blocks, untrusted software tools, and external actors for manufacturing, post-production test, and validation. The many untrusted actors involved throughout the IC’s lifetime become a secu…

External GPU (eGPU) + NVIDIA Drivers on Linux: Solving the Display Manager Initialization Problem TL;DR: If your NVIDIA eGPU works in recovery mode but gives a black screen on normal boot, you're missing one critical Xorg option: AllowExternalGpus . This guide shows how to fix it properly on any X11-based Linux distribution. Introduction Installing NVIDIA drivers on a Linux system with an externa…
International audience
Modern real-time systems exhibit non-deterministic behavior and state divergence due to latency, asynchronous communication, and event-driven architectures that lack guarantees of consistent execution across distributed devices. Traditional systems rely on event semantics, where discrete instructions are transmitted and interpreted independently by receiving nodes. This introduces a fundamental l…
Abstract Programming languages differ significantly in how subprogram calls and runtime stack management are implemented, which reflects underlying variations in execution models, design philosophies, and performance objectives. This study systematically compares subprogram call implementation across four widely used languages: C, Java, Python, and Haskell—examining activation record structures, …
Abstract Programming languages differ significantly in how subprogram calls and runtime stack management are implemented, which reflects underlying variations in execution models, design philosophies, and performance objectives. This study systematically compares subprogram call implementation across four widely used languages: C, Java, Python, and Haskell—examining activation record structures, …
The perennial belief that one firewall product is enough to safeguard all sections of a modern enterprise is not merely a fallacy that is based on budget constraint. It is an architectural disaster that has quantifiable effects. This paper has brought forward a domain specific model to comprehend why information technology (IT) networks, operational technology (OT) space, as well as internet-faci…
Web applications have become critical components of modern digital infrastructure, making them frequent targetsof cyberattacks such as SQL injection, cross-site scripting, command injection, and directory traversal. Traditional Web Application Firewalls rely primarily on signature-based rule matchingandoftenfailtodetectobfuscatedorpreviouslyunseen attacks. This paper proposes an AI-enhanced Web A…
The rapid advancement of artificial intelligence has raised concerns regarding its trustworthiness, especially in terms of interpretability and robustness. Tree-based models such as Random Forest excel in interpretability and accuracy for tabular data, but scaling them remains computationally expensive due to poor data locality and high data dependence. Previous efforts to accelerate these models…
The rapid proliferation of the Internet of Things (IoT) leaves terminal devices vulnerable to considerable security challenges, notably the absence of robust yet efficient identity authentication mechanisms. Traditional certificate-based approaches incur substantial management overhead and storage expenditure, whereas Identity-Based Cryptography poses inherent key escrow risks. To tackle these ch…
research.ioSign up to keep scrolling
Create your feed subscriptions, save articles, keep scrolling.